Author of the publication

Countering kernel rootkits with lightweight hook protection.

, , , and . ACM Conference on Computer and Communications Security, page 545-554. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Collapsar: A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention., , and . J. Parallel Distrib. Comput., 66 (9): 1165-1180 (2006)Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring., , , and . ARES, page 74-81. IEEE Computer Society, (2009)vEye: behavioral footprinting for self-propagating worm detection and profiling., and . Knowl. Inf. Syst., 18 (2): 231-262 (2009)Enabling Trusted Data-intensive execution in cloud computing., , , and . CNS, page 355-363. IEEE, (2014)AirBag: Boosting Smartphone Resistance to Malware Infection., , , , and . NDSS, The Internet Society, (2014)Combining Discretionary Policy with Mandatory Information Flow in Operating Systems., , , and . ACM Trans. Inf. Syst. Secur., 14 (3): 24:1-24:27 (2011)Intrusion Detection Models Based on Data Mining., , and . Int. J. Comput. Intell. Syst., 5 (1): 30-38 (2012)Tracking the Trackers: Fast and Scalable Dynamic Analysis of Web Content for Privacy Violations., , , and . ACNS, volume 7341 of Lecture Notes in Computer Science, page 418-435. Springer, (2012)Countering Persistent Kernel Rootkits through Systematic Hook Discovery., , , and . RAID, volume 5230 of Lecture Notes in Computer Science, page 21-38. Springer, (2008)An Empirical Investigation into the Security of Phone Features in SIP-Based VoIP Systems., , , , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 59-70. Springer, (2009)